About:

Born between E.T. and Blade Runner, occasionally hacking and breaking things, computer scientist living in Berlin.

Website:

Incoming Links:

Outgoing Links:

Subscribe to RSS:
The text discusses the best practices for read-only containers in Docker. It explains the core value proposition of Linux containers, the distinction between image and container, and the importance of making the container root fil...
The blog post discusses the challenges of implementing the Resource Server side in Django for OAuth2, focusing on consuming access tokens rather than issuing them. It explains the need for configuring the resource server with the ...
The author discusses the importance of including specific details in bug reports, such as what was done, what happened, and what was expected to happen. These details help in identifying and fixing issues effectively.
The blog post discusses best practices for Docker deployment, focusing on avoiding giving full root access to production servers. It suggests using docker compose for container management, restricting SSH keys for update deploymen...
The blog post discusses the use of JWTs for authentication tokens, explaining how they work and the tradeoffs involved. It highlights that JWTs are designed for large-scale environments like Google or Facebook, and may not be nece...
The blog post discusses the potential end of Bitcoin due to a shift in mining income from block rewards to transaction fees, leading to high fees, low usage, and potential 51% attacks. It also explores the possibility of miners be...
This blog post explains Common Table Expressions (CTE) in SQL, how to use them for recursive queries, and how to apply them in Django. It also discusses the benefits of CTEs in simplifying complex operations and improving query re...
The blog post discusses the process of creating an efficient multi-stage build for a Python Django project in Docker. It covers the challenges faced, the initial Dockerfile setup, issues with large image size and long re-build tim...
The author discusses the difficulty of debugging SQL queries in Django unit tests with py.test. They explain the lack of existing helpers or plugins to easily output SQL queries and provide a workaround using Django's query tracki...
The blog post discusses the issue of user intent in closed source IoT applications, particularly in relation to voice assistants like Amazon Alexa and Google Assistant. It proposes an auditing system to confirm user intent without...
The blog post discusses using a KY-040 rotary encoder with Linux on the Raspberry Pi. It compares different approaches to reading the encoder's signals and highlights the challenges faced with Python code. The post also explains h...
The blog post discusses how to calculate an RSA public key from two signatures using OpenSSL and SageMath. It explains the process of RSA signature generation, padding, and the necessary formulas. The post includes code snippets a...